Honest Databases That Can Keep Secrets
نویسندگان
چکیده
Polyinstantiation has generated a great deal of controversy lately. Some have argued that polyinstantiation and integrity are fundamentally incompatible, and have proposed alternatives to polyinstantiation. Others have argued about the correct de nition of polyinstantiation and its operational semantics. In this paper we provide a fresh analysis of the basic problem that we are trying to solve, i.e., how can a honest database keep secrets? Our analysis leads us to the concept of restricted polyinstantiation wherein we show how to solve this problem without compromising on any of the following requirements: secrecy, integrity, availability-of-service, element-level labeling and high assurance. This is the rst solution to meet all these requirements simultaneously.
منابع مشابه
Analysis of Positive Incentives for Protecting Secrets in Digital Rights Management
A common problem to current DRM-based services that usually offer streaming digital content and support period pricing (monthly or yearly subscription) systems is how to prevent secret (e.g., account and password) sharing beyond authorized consumers. Traditional technical solutions such as binding the secrets with specific devices can only solve this problem to some extent at the cost of user’s...
متن کاملEliminating polyinstantiation securely
Polyinstantiation has generated a great deal of controversy lately. Some have argued that pol~nstantia~on and integriry are fundamentally incompatible, and have proposed alternatives to polyinstantiation. Others have argued about the correct definition of polyinstantiation and its operational semantics. In this paper we provide a fresh analysis of the basic problem that we are rrying ro solve; ...
متن کاملمسؤولیت مدنی ناشی از افشای اسرار پزشکی در حقوق ایران و کامنلا
Revealing medical secrets is one of the most important topics in medical law, and has an ancient root in medical history and morality. Keeping patients' secrets is one of the certain laws in internal and international laws and regulations of the most countries that have been recognized in patients' bill of rights. Keeping patients' secrets causes patients to confide in physicians and refer to t...
متن کاملOn the Feasibility of Consistent Computations
In many practical settings, participants are willing to deviate from the protocol only if they remain undetected. Aumann and Lindell introduced a concept of covert adversaries to formalize this type of corruption. In the current paper, we refine their model to get stronger security guarantees. Namely, we show how to construct protocols, where malicious participants cannot learn anything beyond ...
متن کاملHow to Collaborate between Threshold Schemes
Threshold schemes have been used to protect secrets by distributing shares to participants. To protect two secrets, we can use two separate traditional schemes, say, a (t1, n1) scheme and a (t2, n2) scheme. If there are u (≤min(t1, t2) ) participants involved in both schemes, each of these u participants must keep two different shares. This paper proposes a method that allows each common partic...
متن کامل